咨询与建议

限定检索结果

文献类型

  • 1,381 篇 会议
  • 353 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 1,750 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 945 篇 工学
    • 744 篇 计算机科学与技术...
    • 636 篇 软件工程
    • 257 篇 信息与通信工程
    • 145 篇 生物工程
    • 126 篇 控制科学与工程
    • 98 篇 生物医学工程(可授...
    • 88 篇 电气工程
    • 82 篇 光学工程
    • 80 篇 电子科学与技术(可...
    • 50 篇 网络空间安全
    • 49 篇 动力工程及工程热...
    • 47 篇 安全科学与工程
    • 38 篇 交通运输工程
    • 37 篇 机械工程
    • 33 篇 化学工程与技术
  • 505 篇 理学
    • 259 篇 数学
    • 152 篇 生物学
    • 125 篇 物理学
    • 106 篇 统计学(可授理学、...
    • 43 篇 系统科学
    • 31 篇 地球物理学
  • 275 篇 管理学
    • 150 篇 图书情报与档案管...
    • 133 篇 管理科学与工程(可...
    • 86 篇 工商管理
  • 102 篇 医学
    • 79 篇 临床医学
    • 75 篇 基础医学(可授医学...
    • 57 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 65 篇 法学
    • 55 篇 社会学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 130 篇 accuracy
  • 72 篇 computational mo...
  • 67 篇 deep learning
  • 65 篇 machine learning
  • 64 篇 real-time system...
  • 57 篇 feature extracti...
  • 56 篇 predictive model...
  • 54 篇 convolutional ne...
  • 51 篇 training
  • 44 篇 data models
  • 42 篇 machine learning...
  • 39 篇 artificial intel...
  • 37 篇 support vector m...
  • 35 篇 analytical model...
  • 35 篇 technological in...
  • 32 篇 security
  • 31 篇 internet of thin...
  • 30 篇 visualization
  • 27 篇 reliability
  • 27 篇 data mining

机构

  • 15 篇 faculty of compu...
  • 15 篇 gik institute of...
  • 15 篇 university of eu...
  • 15 篇 department of ph...
  • 15 篇 dept. of technol...
  • 14 篇 lovely professio...
  • 13 篇 center for data ...
  • 13 篇 bcmaterials basq...
  • 13 篇 dept. of linguis...
  • 11 篇 fermi national a...
  • 11 篇 department of ph...
  • 11 篇 dept. of compute...
  • 11 篇 computer science...
  • 11 篇 kavli institute ...
  • 11 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 10 篇 madrid
  • 10 篇 department of ph...
  • 10 篇 smart data & kno...
  • 9 篇 department of ph...

作者

  • 21 篇 bowman samuel r.
  • 17 篇 ali raja hashim
  • 16 篇 zain ul abideen
  • 15 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 raja hashim ali
  • 13 篇 ashwini kodipall...
  • 13 篇 günnemann stepha...
  • 12 篇 dengel andreas
  • 12 篇 schröder markus
  • 11 篇 gruendl r.a.
  • 11 篇 ali zeeshan ijaz
  • 11 篇 sanchez e.
  • 11 篇 carretero j.
  • 11 篇 kodipalli ashwin...
  • 11 篇 jilek christian
  • 10 篇 miquel r.
  • 10 篇 ravindran balara...
  • 10 篇 gruen d.
  • 10 篇 doel p.

语言

  • 1,655 篇 英文
  • 88 篇 其他
  • 6 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Data Science and Computer Applications"
1750 条 记 录,以下是171-180 订阅
排序:
Robust Sensor Networks: Applying AI for Fault Identification in Challenging Operational Contexts  5
Robust Sensor Networks: Applying AI for Fault Identification...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Manjunatha, A.S. Venkatramana Bhat, P. Ramakrishna, M. Prabhu, Matti Nidhi Dept. of Computer and Communication Engineering NMAM Institute of Technology Nitte Karnataka Mangaluru India Dept. of Computer Science and Engineering NMAM Institute of Technology Nitte Karnataka Mangaluru India Manipal Academy of Higher Education Dept. of Data Science and Computer Applications Manipal Institute of Technology Manipal576104 India
Wireless Sensor Networks (WSNs) are highly implemented in harsh and dynamic environments. In such configurations, faults and anomalies easily occur, causing unwanted disruptions in data accuracy and network performanc... 详细信息
来源: 评论
TCCL: Discovering Better Communication Paths for PCIe GPU Clusters  24
TCCL: Discovering Better Communication Paths for PCIe GPU Cl...
收藏 引用
29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2024
作者: Kim, Heehoon Ryu, Junyeol Lee, Jaejin Dept. of Computer Science and Engineering Seoul National University Seoul Korea Republic of Dept. of Data Science Dept. of Computer Science and Engineering Seoul National University Seoul Korea Republic of
Exploiting parallelism to train deep learning models requires GPUs to cooperate through collective communication primitives. While systems like DGX, equipped with proprietary interconnects, have been extensively studi... 详细信息
来源: 评论
A Review Paper on Various Energy Saving Techniques in WSN
A Review Paper on Various Energy Saving Techniques in WSN
收藏 引用
2022 International Conference on Electronics and Renewable Systems, ICEARS 2022
作者: Josephine V. L., Helen Rajan, Dhivya Rajalakshmi, K. Cmr Institute of Technology Dept. of Computer Applications Karanataka Bengaluru India Montfort College Dept. Of. Computer Science Karanataka Bengaluru India
WSN (Wireless Sensor Network) is a unique variety of temporary type of Local area networks that are highly distributed self-organized systems. There is a detailed collection of various sensor nodes which are vastly de... 详细信息
来源: 评论
I. Predicting future citation counts using machine learning  22
I. Predicting future citation counts using machine learning
收藏 引用
22nd International Arab Conference on Information Technology, ACIT 2021
作者: Mansour, Khalid Al-Daoud, Essam Al-Karaky, Baha Data Science and AI Dept. Zarqa University Zarqa Jordan Computer Science Dept. Zarqa University Zarqa Jordan
The number of citations for a research paper is an important criterion in the scientific research community and is also an important quality indicator for both the author and the affiliated institution. Since the numb... 详细信息
来源: 评论
Smart and Secure Certificate Validation System through Blockchain  2
Smart and Secure Certificate Validation System through Block...
收藏 引用
2nd International Conference on Inventive Research in Computing applications, ICIRCA 2020
作者: Gundgurti, Padmavati E Alluri, Kranthi Gundgurti, Poornima E Sai Harika, K. Vaishnavi, G. BVRIT HYDERABAD College of Engineering for Women Dept. of Computer Science and Engineering Hyderabad Telangana India Sharanabasaveshwara University Dept. of Computer Science and Applications Kalaburagi Karnataka India
In this paper, the problems that arise due to counterfeiting the Certificates and a platform to overcome the mentioned problem are stated. To implement the platform the concept of Blockchain isused. An incontestable a... 详细信息
来源: 评论
PoI: Proof of Identity and PoDI: Proof of data Integrity for Secure data Deduplication in the Cloud  2
PoI: Proof of Identity and PoDI: Proof of Data Integrity for...
收藏 引用
2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems, ACCESS 2021
作者: Ebinazer, Silambarasan Elkana Savarimuthu, Nickolas Bhanu, Mary Saira S. Dept. of Computer Applications National Institute of Technology Tiruchirappalli India Dept. of Computer Science and Engg. National Institute of Technology Tiruchirappalli India
Cloud storage is the decisive service for the organization, hospitals etc., for storing huge amount of data within their budget. But, Cloud Service Providers (CSPs) are facing the major problem of duplicate and redund... 详细信息
来源: 评论
SRSnF: A strategy for secured routing in spray and focus routing protocol for DTN
SRSnF: A strategy for secured routing in spray and focus rou...
收藏 引用
2nd International Conference on Advances in Computing and Information Technology, ACITY-2012
作者: Saha, Sujoy Verma, Rohit Sengupta, Satadal Mishra, Vineet Nandi, Subrata Dept. of Computer Science and Engineering National Institute of Technology Durgapur India Dept. of Computer Applications National Institute of Technology Durgapur 713209 India
This paper deals with the aspect of security in Delay Tolerant Networks (DTN). DTNs are characterized with decentralized control. Network performance and trustworthiness of transmitted information in DTNs depend upon ... 详细信息
来源: 评论
Predictive Analysis of Diabetes Mellitus Using Decision Tree Approach  2
Predictive Analysis of Diabetes Mellitus Using Decision Tree...
收藏 引用
2nd Asian Conference on Innovation in Technology, ASIANCON 2022
作者: Thotad, Puneeth Bharamagoudar, Geeta R. Anami, Basavaraj S. Kle Institute of Technology Dept. of Master of Computer Applications Hubballi India Kle Institute of Technology Dept. of Computer Science & Engineering Hubballi India
Diabetes Mellitus is one of the Non-Communicable Disease. It is characterized by hyperglycemia. It may be reason for numerous health difficulties. According to the statistics in coming years, in 2030, worldwide it rea... 详细信息
来源: 评论
Automatic Segmentation based Graphical Interface for Recognition of Tomography Image Analysis of Damage cell  3
Automatic Segmentation based Graphical Interface for Recogni...
收藏 引用
3rd International Conference on Inventive Systems and Control, ICISC 2019
作者: Rao, K Rajesh Samanta, Debabrata Somashekara, M.T. Gurunath, R. Paul, Abhishek Acharya Institute of Institute Department of MCA Bangalore India DayanandaSagar College of Arts Science and Commerce Dept. of Computer Applications Bangalore India Bangalore University Dept. of Computer Applications Bangalore India
The recent improvement in Medical picture development has facilitated Computed Tomography Image study by Automatic division of impaired cell. Automatic division of impaired cell will provide the required information, ... 详细信息
来源: 评论
Hindi News Article's Headline Generation based on Abstractive Text Summarization
Hindi News Article's Headline Generation based on Abstractiv...
收藏 引用
2023 IEEE International Conference on Network, Multimedia and Information Technology, NMITCON 2023
作者: Kumar, Jeetendra Shekhar, Shashi Gupta, Rashmi Atal Bihari Vajpayee University Dept. of Computer Science and Application Bilaspur India Gla University Dept. of Computer Engineering and Applications Mathura India
Text summarization is a technique that converts large text into shorter ones by keeping its important information. Most of the available summarizers, summarize English language text. The availability of summarizers in... 详细信息
来源: 评论